Daily Archives: November 17, 2018

Abbey Road Studios, the world-famous studio that was home to The Beatles and Pink Floyd, is trying to shape the future of music creation at its first hackathon using Microsoft technology.

The London studio’s audio technology incubator, Abbey Road RED, invited around 100 developers, technologists, designers and music producers to find new ways of capturing sound and revolutionising the engineering process.

Microsoft provided artificial intelligence technology and experts for the event, which will gather feedback on how the music industry could use its cognitive services.

“I’m incredibly excited to share some of the latest Microsoft AI tools with participants in the Abbey Road RED Hackathon,” said Noelle LaCharite, Leading Applied AI DevEx at Microsoft. “Our suite of AI technology, including object detection, sentiment analysis and natural language understanding, has awesome potential for musicians, engineers, audio programmers and designers.”

The hackathon was held in Studio One, where Sir Edward Elgar performed Land of Hope and Glory in 1931 and was the recording venue for scores to The Lord of The Rings trilogy, Star Wars: Episode V – The Empire Strikes Back, Gravity and Black Panther.

Start-ups and partners of Abbey Road RED demoed smart microphones, innovative instruments and chip-level hardware devices to inspire the hackers, while art/tech group Hackoustic built a sound art installation and performed at the end of the event.

Dom Dronska, Head of Digital at Abbey Road Studios, said: “In the same room that witnessed the inception of the recording industry, we embraced the next paradigm shift in music creation – exploring the influence of the newest technologies and high performance computing on our creative tools.

“For the first time ever, we brought together the brightest technologists and music producers and created a unique inspirational atmosphere where beautiful accidents can happen. Abbey Road’s sole reason of existence is to enable creativity in its many forms, and today we are employing AI and machine learning to see how music makers can apply technology in the post digital era.”

﻿

The main Microsoft prize went to Rapple for their AI-powered rap battle partner. The creation, which uses speech recognition software from Microsoft, listens to you freestyle using a beat and then responds on the same beat. It is hoped that the solution could help freestyle rappers to practice and inspire songwriters.

Microsoft is one of the world’s leading experts on AI, developing systems that are designed to help the environment and protect people across the world. In January, Microsoft published a book entitled The Future Computed: Artificial Intelligence and its role in society, which provides readers with the company’s view on where AI technology is going and the new societal issues it has raised.

As Microsoft continues to work towards breakthroughs in AI, RED is doing the same for recording. The incubator is currently exploring the use of spatial audio – a way of producing sounds in 360 degrees around a listener that creates results similar to those people hear in real-life.

Abbey Road RED was Europe’s first music technology incubator when it was launched in 2015. It finds and works with promising music technology start-ups to develop new products, and is now home to four companies – BroomX, Cotodama, Humtap and Lickd.

The incubator forms part of the legendary studios that recorded Pink Floyd, Kanye West, Lady Gaga, Ed Sheeran, Amy Winehouse and The Beatles, whose members were famously photographed crossing the road outside.

Container portability across clouds is the holy grail of IT management for many enterprises, but it takes more than multi-cloud Kubernetes compatibility to get there.

Early adopters of multi-cloud infrastructures can handle the initial Kubernetes setup on their own with open source software. But as the complexity of multi-cloud management sets in, they turn to container security tools from third-party specialists, such as Aqua Security, Twistlock and StackRox. These tools consolidate security monitoring into one interface as containers become too numerous and spread out across cloud data centers to scan for vulnerabilities manually. They also provide alerts and request blocking and container quarantine features that help users quickly address container security issues.

Mux Inc., a video streaming startup that serves media giants such as CBS and PBS, is one such early adopter of container security tools in a multi-cloud environment. The company runs thousands of containers for its video data analytics and video streaming services, and it set up container infrastructure with the kops open source management tool for Kubernetes on Amazon and Google public clouds. But, as workloads grew, Mux DevOps engineers quickly became overwhelmed with container image security scanning and security incident response.

“As our services have grown, we’ve gotten more and more enterprise contracts, which have required more enterprise security audits and compliance,” said Adam Brown, co-founder of Mux in San Francisco. “We wanted something we could drop in to what we have with minimal friction, that offered the quickest turnaround time to know what’s broken and triage vulnerabilities as quickly as possible.”

Mux evaluated Aqua Security, Twistlock and StackRox, and it opted for StackRox based on its easy deployment and for its management interface.

StackRox software is installed as a privileged Kubernetes DaemonSet that monitors system calls at the host kernel layer, creates dashboards and issues alerts as it detects potential security vulnerabilities among containers. For Mux engineers, StackRox offered a balance between fine-grained container security data collection and simple quarantine and response procedures that cut through the noise of the growing container environment.

“We like the way StackRox ranks vulnerabilities by severity — not just for containers, but network services, as well,” Brown said.

For now, his team is less interested in automated responses to anomalous container behavior than in dashboards that quickly pinpoint areas for his team to manually investigate.

“We have a lot of flux in our current infrastructure, as it is still an early and rapidly evolving product. So, we don’t want to cause more problems for ourselves by terminating legitimate traffic until things are very stable,” Brown said.

Enterprises face paradox of choice with container security tools

As a small company without a separate IT security team, Mux faced few internal political hurdles in selecting its container security tool, and it was able to pick the one it felt offered the best developer experience and simplest interface.

We have a lot of flux in our current infrastructure … we don’t want to cause more problems for ourselves by terminating legitimate traffic until things are very stable.Adam Brownco-founder, Mux

Container security tool selection is more difficult for large enterprise companies with IT security teams and DevOps teams that share responsibility for applications in containers. For these buyers, specialized container security tools also fight for attention against incumbent IT security vendors, such as Trend Micro, that have added container support in 2018 — all while enterprises struggle internally to achieve cooperation between DevOps and security teams.

Aqua says its user base of large enterprises demands not only more advanced automation features for containers, but also support for serverless security, which the company now offers in version 3.5 of its Container Security Platform (CSP) released this week. Aqua CSP 3.5 includes more granular policy enforcement and role-based access control features, as well as a Workload Explorer visualization tool to simplify container security monitoring in complex Kubernetes environments.

Unfortunately for IT buyers, no tool exists to manage the market’s complexity the way container security tools manage complex vulnerabilities in Kubernetes clusters.

“It makes me think of the idea of the paradox of choice in economics, that too many choices may make buyers less happy with their selection and may actually lead to fewer purchases,” said Fernando Montenegro, analyst at 451 Research, referring to a 2004 book by American psychologist Barry Schwartz.

The market will need more time for container security tool vendors to rise to the top of buyers’ radar and for security decisions to be concentrated within smaller, centralized DevSecOps teams, Montenegro said.

Active Member

As mentioned in the title I am looking for an Intel Compute Stick (either an m3 or an m5), or an Azulle Access3.

Can be used, needs to have Windows 10 installed and activated. If there are any issues (cosmetic or otherwise) let me know beforehand.

Let me know what you have.

Location: UK

______________________________________________________This message is automatically inserted in all classifieds forum threads.By replying to this thread you agree to abide by the trading rules detailed here.Please be advised, all buyers and sellers should satisfy themselves that the other party is genuine by providing the following via private conversation to each other after negotiations are complete and prior to dispatching goods and making payment:

Landline telephone number. Make a call to check out the area code and number are correct, too

Name and address including postcode

Valid e-mail address

DO NOT proceed with a deal until you are completely satisfied with all details being correct. It’s in your best interest to check out these details yourself.

Share This Page

LAS VEGAS — Cisco is building architecture to help customers unify diverse networking domains — a Cisco strategy that will rely on software.

At Cisco Partner Summit 2018, the networking vendor outlined what it terms a multi-domain architecture. David Goeckeler, executive vice president of networking and security business at Cisco, said the goal is to securely connect any user, on any device, in any network to any application.

Goeckeler said Cisco’s new take on architecture is prompted by enterprise expansion to the cloud, which has complicated IT for technology managers. Applications that used to run in the data center are now “all over the place,” provided through SaaS vendors and cloud providers.

An organization’s network infrastructure must provide access to these scattered systems. Goeckeler said network domains, in general, include data center, campus, branch and external cloud providers. Security, meanwhile, overlays all of the networking environments.

“All of these [domains] have been kind of thought about as independent parts of the network, and they are all changing on their own,” Goeckeler said.

Cisco strategy addresses aging networks

Networks built 30 years ago are not geared to that environment, he said, adding that CIOs are left to manage a situation characterized by ever-changing dynamics.

Building this architecture … is the biggest opportunity we have seen in a very long time in the networking business.David Goeckelerexecutive vice president at Cisco

Goeckeler said the Cisco strategy — the multi-domain architecture — aims to interconnect the various networking domains with “one big software system.”

In a blog post, Goeckeler suggested elements of the multi-domain architecture are already in place. He pointed to Cisco’s software-defined WAN product line that is integrated with Cisco’s security offerings, which, in turn, are linked with the Meraki Dashboard and DNA Center.

“We are now beginning to integrate DNA (campus) and ACI [Application Centric Infrastructure] (data center) together through common policies that can map across these domains,” Goeckeler wrote.

“Building this architecture … is the biggest opportunity we have seen in a very long time in the networking business,” Goeckeler said, speaking at Cisco Partner Summit 2018.

Extending intent-based networking

Jason Parry, vice president of client solutions at Force 3, an IT solutions provider and Cisco partner based in Crofton, Md., said the Cisco strategy around its multi-domain architecture appears to be an effort to expand upon earlier software-defined efforts. He pointed to Cisco’s SD-Access, an intent-based networking offering that provides a network fabric spanning LANs and wireless LANs.

“Where something like SD-Access is very campus-driven, they are building platforms that extend that [intent-based networking] across various domains,” Parry said.

He said Cisco could use its recent Duo identity management acquisition to extend intent-based networking via security policies, for example.

Clayton Daffron, director of solution architecture at Denali Advanced Integration, a managed services provider and Cisco partner based in Redmond, Wash., said Cisco’s stated goal for a while has been to create dynamic, programmable environments that orchestrate networks from the endpoint to, potentially, the cloud. He cited Cisco’s Application Centric Infrastructure in the data center and intent-based networking in the campus setting as examples.

“Cisco loves to tie as many things together as possible,” Daffron noted.

Active Member

As mentioned in the title I am looking for an Intel Compute Stick (either an m3 or an m5), or an Azulle Access3.

Can be used, needs to have Windows 10 installed and activated. If there are any issues (cosmetic or otherwise) let me know beforehand.

Let me know what you have.

Location: UK

______________________________________________________This message is automatically inserted in all classifieds forum threads.By replying to this thread you agree to abide by the trading rules detailed here.Please be advised, all buyers and sellers should satisfy themselves that the other party is genuine by providing the following via private conversation to each other after negotiations are complete and prior to dispatching goods and making payment:

Landline telephone number. Make a call to check out the area code and number are correct, too

Name and address including postcode

Valid e-mail address

DO NOT proceed with a deal until you are completely satisfied with all details being correct. It’s in your best interest to check out these details yourself.